{"id":392,"date":"2024-12-12T16:46:38","date_gmt":"2024-12-12T15:46:38","guid":{"rendered":"https:\/\/tec-networks.com\/?page_id=392"},"modified":"2025-10-10T13:24:54","modified_gmt":"2025-10-10T11:24:54","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/tec-networks.xyz\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div>Cybersecurity<\/div>\n<h1><strong>IT-Security mit Tec Networks: Sicher, smart und immer up-to-date<\/strong><\/h1>\n<div>\n<p>Egal, ob ihr eure IT einfach mal auf Schwachstellen durchleuchten lassen wollt oder euch eine dauerhafte \u00dcberwachung w\u00fcnscht. Wir \u00fcbernehmen f\u00fcr euch die entscheidenden Aufgaben im Bereich Cyber-Security als Managed Service, sodass ihr euch voll auf euer Business konzentrieren k\u00f6nnt. Und weil IT-Sicherheit beim Anwender beginnt, bieten wir euch auch umfassende IT-Security Awareness Schulungen an.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/03\/cybersecurity-hero-bild.svg\" alt=\"Cybersecurity Illustration\"><br \/>\n<a href=\"#security-pakete\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/arrow.png\" alt=\"scroll to first section\"><\/a><\/p>\n<div>Angebote<\/div>\n<h2>\n<h2 style=\"text-align: center;\"><strong>Unsere IT-Security-Pakete<\/strong><\/h2>\n<\/h2>\n<h3>\n<h2><strong>Cyber Scan \u2013 Einmalige Schwachstellenerkennung<\/strong><\/h2>\n<\/h3>\n<div>\n<p>Ihr wollt wissen, wie es um eure IT-Sicherheit bestellt ist? Unser Cyber Scan gibt euch eine einmalige Momentaufnahme eurer IT-Sicherheit, die aus Sicht eines Hackers aufzeigt, wo potenzielle Einfallstore liegen. So wisst ihr genau, wo die Knackpunkte liegen und woran ihr dringend arbeiten solltet. Ein bisschen wie ein Check-up beim Arzt \u2013 nur f\u00fcr die IT.<\/p>\n<\/div>\n<table>\n<tbody>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Einmaliger IT-Security Scan<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Analyse der IT-Infrastruktur.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Auswertung und Reporting mit klaren Handlungsempfehlungen<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Priorisierte Schritte die euch sofort zeigen was wirklich wichtig ist.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><p>\n        <a href=\"\/kontakt\/\">Jetzt Cyber Scan anfragen<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>    <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-scan.png\" alt=\"cyber scan bild\"><\/p>\n<\/div>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-scan-1.png\" alt=\"cyber scan\"><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-scan-2.png\" alt=\"Cyber Smart Bild\"><\/p>\n<\/li>\n<\/ul>\n<h3>\n<h2><strong>Cyber Guard \u2013 Kontinuierliches Schwachstellenmanagement<\/strong><\/h2>\n<\/h3>\n<div>\n<p>F\u00fcr alle, die ihre IT-Sicherheit lieber kontinuierlich im Blick haben wollen: Unser Cyber Guard bietet regelm\u00e4\u00dfige Schwachstellenscans und eine dauerhafte \u00dcberwachung. Damit seht ihr kontinuierlich, wo die Schwachstellen liegen und k\u00f6nnt rechtzeitig handeln, bevor jemand anderes es tut. Sozusagen ein Cyber Scan auf Koffein.<\/p>\n<\/div>\n<table>\n<tbody>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Regelm\u00e4\u00dfiger IT-Security Scan.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Analyse der IT-Infrastruktur.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Auswertung und monatliches Meeting mit konkreten To-dos und Priorit\u00e4ten.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Ein \u00fcbersichtliches Dashboard f\u00fcr laufende Ergebnisse &amp; Dokumentation<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Wenn BSI, KRITIS oder ISO f\u00fcr euch relevant sind, dann ist Cyber Guard euer Freund.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><p>\n        <a href=\"\/de\/cybersecurity\/cyberguard\/\">Mehr \u00fcber den Cyber Guard erfahren<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>    <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-scan-2.png\" alt=\"cyber scan bild\"><\/p>\n<\/div>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-guard.png\" alt=\"cyber guard bild\"><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-scan-1.png\" alt=\"cyber scan\"><\/p>\n<\/li>\n<\/ul>\n<h3>\n<h2><strong>Cyber Smart \u2013 IT-Security Awareness Schulungen<\/strong><\/h2>\n<\/h3>\n<div>\n<p>IT-Security f\u00e4ngt beim Menschen an! Mit Cyber Smart st\u00e4rken wir euer Team gegen die Gefahren des digitalen Alltags. Unsere Awareness-Schulungen sind immer up-to-date und werden regelm\u00e4\u00dfig angepasst \u2013 schlie\u00dflich \u00e4ndern sich die Angriffsstrategien gef\u00fchlt t\u00e4glich. Uns ist besonders wichtig, dass wir Menschen an praxisnahen Beispielen zeigen, wie Cyberkriminelle versuchen Ihre Opfer auszutricksen. Und das Beste: Durch Phishing-Simulationen k\u00f6nnen eure Leute auch mal selbst ausprobieren, was im Ernstfall zu tun ist (keine Sorge, das tut nicht weh).<\/p>\n<\/div>\n<table>\n<tbody>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>1&#215;1 der IT-Security: Kompaktes Wissen in verst\u00e4ndlichen Modulen<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Video-on-Demand-Training \u00fcber unsere eigene Lernplattform (Tec Networks Academy)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>Phishing-Simulation \u2013 f\u00fcr Praxiserfahrung im Umgang mit Verdachtsf\u00e4llen<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/blue-check.svg\" alt=\"check\">\n    <\/td>\n<td>\n<p>regelm\u00e4\u00dfige Management-Reports zum Lernfortschritt<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<div><strong>Die Themen im Training:<\/strong><\/div>\n<ul>\n<li>\n<div>\n<p>Grundregeln f\u00fcr sicheres Verhalten<br \/>Schutz vor SPAM &amp; Phishing<br \/>Sicherer Umgang mit Zugangsdaten<\/p>\n<\/div>\n<\/li>\n<li>\n<div>\n<p>Sicheres mobiles Arbeiten<br \/>Schutz vor Social Engineering<br \/>Umgang mit neuen KI-Tools<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p><p>\n        <a href=\"\/kontakt\/\">Jetzt Cyber Smart anfragen<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>    <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/11\/cyber-smart.png\" alt=\"Cyber Smart Bild\"><\/p>\n<\/div>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-smart-1.png\" alt=\"cyber guard bild\"><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/12\/cyber-smart-2.png\" alt=\"cyber smart\"><\/p>\n<\/li>\n<\/ul>\n<div>Ein Team, ein Ziel<\/div>\n<div>\n<h2><strong>Das IT-Security-Team von Tec Networks: Eure Lotsen durch die digitale See<\/strong><\/h2>\n<\/div>\n<div>\n<p>Unser IT-Security-Team besteht aus Profis, die nicht nur die Technik, sondern auch die Herausforderungen der digitalen Welt in- und auswendig kennen. Genau das Team, das ihr braucht, um sicher durch die Untiefen der digitalen Welt zu man\u00f6vrieren \u2013 egal ob hohe Wellen oder ruhige Gew\u00e4sser.<\/p>\n<\/div>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/daniel-juhnke-tecnetworks.png\" alt=\"Portr\u00e4t von Daniel Juhnke\"><\/p>\n<div>\n<p><strong>Daniel Juhnke<\/strong><br \/>Chief Executive Officer<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/tino-weber-tecnetworks.png\" alt=\"Portr\u00e4t von Tino Weber\"><\/p>\n<div>\n<p><strong>Tino Weber<\/strong><br \/>Consultant &amp; Engineer<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/matthias-koesters-tecnetworks.png\" alt=\"Portr\u00e4t von Matthias K\u00f6sters\"><\/p>\n<div>\n<p><strong>Matthias K\u00f6sters<\/strong><br \/>Consultant &amp; Engineer<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/marco-bodewes-tecnetworks.png\" alt=\"Portr\u00e4t von Marco Bodewes\"><\/p>\n<div>\n<p><strong>Marco Bodewes<\/strong><br \/>Finance &amp; Controlling<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<h3><strong>Ihr habt Fragen zu unseren IT-Security-Paketen? <br \/>Wir beraten euch gerne.<\/strong><\/h3>\n<\/div>\n<p><p>\n        <a href=\"\/kontakt\/\">Jetzt Kontakt aufnehmen<\/a>\n    <\/p>\n<\/p>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Hero\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":false,\"height\":\"section\",\"height_offset_top\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"layout\":\"1-2,1-2\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"order_first\":\"s\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"Cybersecurity\",\"margin_remove_bottom\":false,\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"left\",\"title_color\":\"secondary\",\"title_element\":\"div\",\"title_style\":\"h6\"}},{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"<strong>IT-Security mit Tec Networks: Sicher, smart und immer up-to-date<\\\/strong>\",\"content_en_us\":\"<strong>IT security with Tec Networks: secure, smart and always up-to-date<\\\/strong>\",\"margin\":\"small\",\"margin_remove_top\":false,\"maxwidth\":\"xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"left\",\"title_element\":\"h1\",\"title_font_family\":\"default\",\"title_style\":\"h2\"}},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Egal, ob ihr eure IT einfach mal auf Schwachstellen durchleuchten lassen wollt oder euch eine dauerhafte \\u00dcberwachung w\\u00fcnscht. Wir \\u00fcbernehmen f\\u00fcr euch die entscheidenden Aufgaben im Bereich Cyber-Security als Managed Service, sodass ihr euch voll auf euer Business konzentrieren k\\u00f6nnt. Und weil IT-Sicherheit beim Anwender beginnt, bieten wir euch auch umfassende IT-Security Awareness Schulungen an.<\\\/p>\",\"content_en_us\":\"\n\n<p>Regardless of whether you simply want to have your IT scanned for vulnerabilities or would like permanent monitoring. We take on the crucial cyber security tasks for you as a managed service so that you can concentrate fully on your business. And because IT security starts with the user, we also offer comprehensive IT security awareness training.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"left\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"order_first\":\"xs\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"image\",\"props\":{\"animation\":\"scale-up\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/03\\\/cybersecurity-hero-bild.svg\",\"image_alt\":\"Cybersecurity Illustration\",\"image_loading\":true,\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"text_align\":\"center\"}}]}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"slide-top-medium\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"image\",\"props\":{\"animation\":\"none\",\"class\":\"bounce\",\"css\":\".el-element {\\n    padding: 0 !important;\\n    height: 0;\\n}\\n\\n.el-element img {\\n    display: block;\\n\\tmargin: auto;\\n    position: relative;\\n    top: -60px;\\n    left: 0;\\n    right: 0;\\n    animation: bounce 1s infinite ease-in-out;\\n}\\n\\n@media screen and (min-width: 960px) {\\n    .el-element img {\\n        top: -140px;\\n    }\\n}\\n\\n\\n@keyframes bounce {\\n  0%, 100% {\\n    transform: translateY(0);\\n  }\\n  50% {\\n    transform: translateY(-10px);\\n  }\\n}\\n\\n\\n\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/arrow.png\",\"image_alt\":\"scroll to first section\",\"image_svg_color\":\"emphasis\",\"link\":\"#security-pakete\",\"margin\":\"default\"}}]}]}],\"name\":\"Scroll to section button\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"class\":\"it-security-pakete\",\"css\":\".it-security-pakete .uk-grid .uk-flex-first.uk-first-column {\\n    width: 100%; \\n    margin: auto;\\n}\\n\\n.it-security-pakete .uk-grid > .uk-grid-margin {\\n\\n}\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"blend\":false,\"content\":\"Angebote\",\"content_en_us\":\"Offers\",\"margin\":\"remove-vertical\",\"margin_remove_bottom\":false,\"text_align\":\"center\",\"title_color\":\"secondary\",\"title_element\":\"div\",\"title_style\":\"h6\"}},{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<h2 style=\\\"text-align: center;\\\"><strong>Unsere IT-Security-Pakete<\\\/strong><\\\/h2>\",\"content_en_us\":\"\n\n<h2 style=\\\"text-align: center;\\\"><strong>Our IT security packages<\\\/strong><\\\/h2>\",\"id\":\"security-pakete\",\"margin\":\"remove-vertical\",\"margin_remove_bottom\":false,\"margin_remove_top\":true,\"title_element\":\"h2\",\"title_style\":\"h2\"}},{\"type\":\"fragment\",\"props\":{\"margin\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"order_first\":\"s\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<h2><strong>Cyber Scan \\u2013 Einmalige Schwachstellenerkennung<\\\/strong><\\\/h2>\",\"content_en_us\":\"\n\n<h2><strong>Cyber Scan - one-time vulnerability detection<\\\/strong><\\\/h2>\",\"title_element\":\"h3\",\"title_style\":\"h2\"}},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Ihr wollt wissen, wie es um eure IT-Sicherheit bestellt ist? Unser Cyber Scan gibt euch eine einmalige Momentaufnahme eurer IT-Sicherheit, die aus Sicht eines Hackers aufzeigt, wo potenzielle Einfallstore liegen. So wisst ihr genau, wo die Knackpunkte liegen und woran ihr dringend arbeiten solltet. Ein bisschen wie ein Check-up beim Arzt \\u2013 nur f\\u00fcr die IT.<\\\/p>\",\"content_en_us\":\"\n\n<p>Do you want to know how your IT security is doing? Our Cyber Scan gives you a unique snapshot of your IT security, showing you from a hacker's perspective where the potential gateways are. So you know exactly where the weak points are and what you need to work on urgently. A bit like a check-up at the doctor's - only for IT.<\\\/p>\",\"css\":\".el-element {\\n    margin-top: 60px;\\n\\tmax-width: 580px;\\n}\",\"margin\":\"default\"}},{\"type\":\"table\",\"props\":{\"animation\":\"none\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"table_order\":\"1\",\"table_responsive\":\"overflow\",\"table_width_meta\":\"shrink\",\"table_width_title\":\"shrink\"},\"children\":[{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Einmaliger IT-Security Scan<\\\/p>\",\"content_en_us\":\"\n\n<p>One-off IT security scan<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\",\"title\":\"\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Analyse der IT-Infrastruktur.<\\\/p>\",\"content_en_us\":\"\n\n<p>Analysis of the IT infrastructure.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Auswertung und Reporting mit klaren Handlungsempfehlungen<\\\/p>\",\"content_en_us\":\"\n\n<p>Evaluation and reporting with clear recommendations for action<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Priorisierte Schritte die euch sofort zeigen was wirklich wichtig ist.<\\\/p>\",\"content_en_us\":\"\n\n<p>Prioritized steps that show you immediately what is really important.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}}]},{\"type\":\"button\",\"props\":{\"animation\":\"none\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Jetzt Cyber Scan anfragen\",\"content_en_us\":\"Request Cyber Smart now\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"kontakt\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"order_first\":\"xs\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"fragment\",\"props\":{\"class\":\"cyber-scan-wrapper\",\"css\":\".cyber-scan-wrapper {\\n    padding-top: 0;\\n}\\n\\n.cyber-scan-wrapper .uk-grid {\\n    margin-left: 0 !important;\\n    position: relative; \\n}\\n\\n.cyber-scan-wrapper .uk-grid > div  {\\n    display: flex;\\n    width: 100%;\\n    flex-wrap: wrap;\\n}\\n\\n.cyber-scan-wrapper .cyber-quard-top > .uk-grid > div {\\n    padding: 0;\\n    margin: 0;\\n    position: relative;\\n    top: 0;\\n    left: 0;\\n    width: 204px;\\n    height: 204px;\\n}\\n\\n.cyber-scan-wrapper .cyber-quard-top img {\\n    object-fit: cover;\\n    -webkit-transform: rotate(90deg);\\n    -moz-transform: rotate(90deg);\\n    -o-transform: rotate(90deg);\\n    -ms-transform: rotate(90deg);\\n    transform: rotate(90deg);\\n}\\n\\n.cyber-scan-wrapper .cyber-section-right {\\n    position: relative;\\n    width: 100%;\\n}\\n\\n.cyber-scan-wrapper .cyber-section-right > .uk-grid {\\n    display: flex;\\n    flex-wrap: nowrap;\\n}\\n\\n.cyber-scan-wrapper .cyber-section-right > .uk-grid > div {\\n    padding: 0;\\n    margin: 0;\\n    display: flex;\\n    flex-wrap: nowrap;\\n}\\n\\n.cyber-scan-wrapper .cyber-section-right .uk-first-column:nth-child(1) {\\n    margin-bottom: 18px;   \\n    top: -70px;\\n    left: 65px;\\n    position: relative;\\n}\\n\\n.cyber-scan-wrapper .cyber-section-right > .uk-grid > div:nth-child(1) img {\\n    object-fit: cover;\\n    width: 100px !important;\\n    height: 100px !important;\\n    position: relative;\\n    z-index: 9;\\n}\\n\\n.cyber-scan-wrapper .cyber-section-right > .uk-grid > div:nth-child(2) img {\\n    object-fit: cover;\\n    width: 153px !important;\\n    height: 154px !important;\\n    display: flex;\\n    top: -160px;\\n    position: relative;\\n    left: 0;\\n}\\n\\n@media screen and (max-width: 549.99px) {\\n    .cyber-scan-wrapper {\\n        max-width: 330px;   \\n        margin: auto;\\n        padding-top: 20px;\\n    }\\n    \\n    .cyber-scan-wrapper .uk-grid > div  {\\n        padding: 0;  \\n         margin-bottom: -150px;\\n    }\\n}\\n\\n@media only screen and (min-width: 550px) {\\n    .cyber-scan-wrapper {\\n        padding-top: 60px;\\n        max-width: 630px;\\n    }\\n\\n    .cyber-scan-wrapper .uk-grid {\\n        margin-left: 0 !important;\\n        position: relative; \\n    }\\n\\n    .cyber-scan-wrapper .uk-grid > div  {\\n        display: flex;\\n        width: 100%;\\n        flex-wrap: wrap;\\n    }\\n\\n    .cyber-scan-wrapper .cyber-quard-top > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        position: relative;\\n        top: 0;\\n        left: 60px;\\n        width: 304px;\\n        height: 304px;\\n    }\\n\\n    .cyber-scan-wrapper .cyber-quard-top img {\\n        object-fit: cover;\\n        height: 304px;\\n        -webkit-transform: rotate(90deg);\\n        -moz-transform: rotate(90deg);\\n        -o-transform: rotate(90deg);\\n        -ms-transform: rotate(90deg);\\n        transform: rotate(90deg);\\n    }\\n\\n    .cyber-scan-wrapper .cyber-section-right {\\n        position: relative;\\n        width: 100%;\\n    }\\n\\n    .cyber-scan-wrapper .cyber-section-right > .uk-grid {\\n        display: flex;\\n        flex-wrap: nowrap;\\n    }\\n\\n    .cyber-scan-wrapper .cyber-section-right > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        display: flex;\\n        flex-wrap: nowrap;\\n    }\\n\\n    .cyber-scan-wrapper .cyber-section-right .uk-first-column:nth-child(1) {\\n        margin-bottom: 18px;   \\n        top: -40px;\\n        left: 0;\\n        position: relative;\\n    }\\n\\n    .cyber-scan-wrapper .cyber-section-right > .uk-grid > div:nth-child(1) img {\\n        object-fit: cover;\\n        width: 258px !important;\\n        height: 258px !important;\\n        position: relative;\\n        z-index: 9;\\n    }\\n\\n    .cyber-scan-wrapper .cyber-section-right > .uk-grid > div:nth-child(2) img {\\n        object-fit: cover;\\n        width: 304px !important;\\n        height: 304px !important;\\n        display: flex;\\n        top: -110px;\\n        position: relative;\\n        left: -80px;\\n    }\\n}\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"class\":\"cyber-quard-top\",\"content_column_breakpoint\":\"m\",\"css\":\"@media only screen and (min-width: 960px) {\\n    .uk-panel > .uk-panel {\\n        margin-top: 0 !important;\\n    }\\n}\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-scan.png\",\"image_alt\":\"cyber scan bild\"}}]},{\"type\":\"grid\",\"props\":{\"class\":\"cyber-section-right\",\"content_column_breakpoint\":\"m\",\"css\":\"@media only screen and (min-width: 960px) {\\n\\n    .uk-panel > .uk-panel {\\n        margin-top: 0 !important;\\n    }\\n}\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-scan-1.png\",\"image_alt\":\"cyber scan\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-scan-2.png\",\"image_alt\":\"Cyber Smart Bild\"}}]}]}]}]}]}]}]},{\"type\":\"fragment\",\"props\":{\"margin\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<h2><strong>Cyber Guard \\u2013 Kontinuierliches Schwachstellenmanagement<\\\/strong><\\\/h2>\",\"content_en_us\":\"\n\n<h2><strong>Cyber Guard - Continuous vulnerability management<\\\/strong><\\\/h2>\",\"title_element\":\"h3\",\"title_style\":\"h2\"}},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>F\\u00fcr alle, die ihre IT-Sicherheit lieber kontinuierlich im Blick haben wollen: Unser Cyber Guard bietet regelm\\u00e4\\u00dfige Schwachstellenscans und eine dauerhafte \\u00dcberwachung. Damit seht ihr kontinuierlich, wo die Schwachstellen liegen und k\\u00f6nnt rechtzeitig handeln, bevor jemand anderes es tut. Sozusagen ein Cyber Scan auf Koffein.<\\\/p>\",\"content_en_us\":\"\n\n<p>For all those who prefer to keep a constant eye on their IT security: Our Cyber Guard offers regular vulnerability scans and continuous monitoring. This allows you to continuously see where the weak points are and act in good time before someone else does. A cyber scan on caffeine, so to speak.<\\\/p>\",\"css\":\".el-element {\\n    margin-top: 60px;\\n\\tmax-width: 580px;\\n}\",\"margin\":\"default\"}},{\"type\":\"table\",\"props\":{\"animation\":\"none\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"table_order\":\"1\",\"table_responsive\":\"overflow\",\"table_width_meta\":\"shrink\",\"table_width_title\":\"shrink\"},\"children\":[{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Regelm\\u00e4\\u00dfiger IT-Security Scan.<\\\/p>\",\"content_en_us\":\"\n\n<p>Regular IT security scan.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\",\"title\":\"\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Analyse der IT-Infrastruktur.<\\\/p>\",\"content_en_us\":\"\n\n<p>Analysis of the IT infrastructure.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Auswertung und monatliches Meeting mit konkreten To-dos und Priorit\\u00e4ten.<\\\/p>\",\"content_en_us\":\"\n\n<p>Evaluation and monthly meeting with specific to-dos and priorities.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Ein \\u00fcbersichtliches Dashboard f\\u00fcr laufende Ergebnisse &amp; Dokumentation<\\\/p>\",\"content_en_us\":\"\n\n<p>A clear dashboard for ongoing results &amp; documentation<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Wenn BSI, KRITIS oder ISO f\\u00fcr euch relevant sind, dann ist Cyber Guard euer Freund.<\\\/p>\",\"content_en_us\":\"\n\n<p>If BSI, KRITIS or ISO are relevant to you, then Cyber Guard is your friend.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}}]},{\"type\":\"button\",\"props\":{\"animation\":\"none\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Mehr \\u00fcber den Cyber Guard erfahren\",\"content_en_us\":\"Request Cyberguard now\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"de\\\/cybersecurity\\\/cyberguard\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"fragment\",\"props\":{\"class\":\"cyber-guard-wrapper\",\"css\":\"@media screen and (max-width: 549.99px) {\\n    .cyber-guard-wrapper {\\n        padding-top: 0;\\n    }\\n\\n    .cyber-guard-wrapper .uk-grid {\\n        margin-left: 0 !important;\\n        position: relative; \\n    }\\n\\n    .cyber-guard-wrapper .uk-grid > div  {\\n        display: flex;\\n        width: 100%;\\n        flex-wrap: wrap;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-quard-top img {\\n        object-fit: cover;\\n        -webkit-transform: rotate(90deg);\\n        -moz-transform: rotate(90deg);\\n        -o-transform: rotate(90deg);\\n        -ms-transform: rotate(90deg);\\n        transform: rotate(90deg);\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right {\\n        position: relative;\\n        width: 100%;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid {\\n        display: flex;\\n        flex-wrap: nowrap;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        display: flex;\\n        flex-wrap: nowrap;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right .uk-first-column:nth-child(1) {\\n        margin-bottom: 18px;   \\n        top: -20px;\\n        left: 10px;\\n        position: relative;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid > div:nth-child(1) img {\\n        object-fit: cover;\\n        width: 132px !important;\\n        height: 132px !important;\\n        position: relative;\\n        z-index: 9;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid > div:nth-child(2) img {\\n        object-fit: cover;\\n        width: 166px !important;\\n        height: 166px !important;\\n        display: flex;\\n        top: -90px;\\n        left: -10px;\\n        position: relative;\\n        left: 0;\\n    }\\n\\n    .cyber-guard-wrapper  {\\n        max-width: 330px;   \\n        margin: auto;\\n        padding-top: 40px;\\n    }\\n\\n    .cyber-guard-wrapper .uk-grid > div  {\\n        padding: 0;  \\n        margin-bottom: -100px;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-left {\\n        padding: 0;\\n        margin: 0;\\n        position: relative;\\n        top: 0;\\n        left: 30px;\\n        width: 232px;\\n        height: 232px;\\n    }\\n}\\n\\n@media only screen and (min-width: 550px) {\\n    .cyber-guard-wrapper {\\n        padding-top: 90px;   \\n        max-width: 630px;\\n    }\\n\\n    .cyber-guard-wrapper .uk-grid {\\n        margin-left: 0 !important;\\n        position: relative; \\n    }\\n\\n    .cyber-guard-wrapper .uk-grid > div  {\\n        display: flex;\\n        width: 100%;\\n        flex-wrap: wrap;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-left > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        width: 304px !important;\\n        height: 304px;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-left img {\\n        object-fit: cover;\\n        height: 100%;\\n        -moz-transform: rotate(0);\\n        -o-transform: rotate(0);\\n        -webkit-transform: rotate(0);\\n        transform: rotate(0);\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right {\\n        position: relative;\\n        width: 100%;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid {\\n        display: flex;\\n        flex-wrap: nowrap;\\n        top: -82px;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        display: flex;\\n        flex-wrap: nowrap;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right .uk-first-column:nth-child(1) {\\n        margin-bottom: 18px;   \\n        left: 6px;\\n        position: relative;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid > div:nth-child(1) img {\\n        object-fit: cover;\\n        width: 304px !important;\\n        height: auto;\\n        position: relative;\\n        right: 30px;\\n        top: 20px;\\n    }\\n\\n    .cyber-guard-wrapper .cyber-section-right > .uk-grid > div:nth-child(2) img {\\n        object-fit: cover;\\n        width: 304px;\\n        height: 304px;\\n        display: flex;\\n        top: -160px;\\n        position: relative;\\n        left: -30px;\\n    }\\n}\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"class\":\"cyber-section-left\",\"content_column_breakpoint\":\"m\",\"css\":\"@media only screen and (min-width: 960px) {\\n    .uk-panel > .uk-panel {\\n        margin-top: 0 !important;\\n    }\\n}\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-scan-2.png\",\"image_alt\":\"cyber scan bild\"}}]},{\"type\":\"grid\",\"props\":{\"class\":\"cyber-section-right\",\"content_column_breakpoint\":\"m\",\"css\":\"@media only screen and (min-width: 960px) {\\n\\n    .uk-panel > .uk-panel {\\n        margin-top: 0 !important;\\n    }\\n}\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-guard.png\",\"image_alt\":\"cyber guard bild\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-scan-1.png\",\"image_alt\":\"cyber scan\"}}]}]}]}]}]}]}]},{\"type\":\"fragment\",\"props\":{\"margin\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<h2><strong>Cyber Smart \\u2013 IT-Security Awareness Schulungen<\\\/strong><\\\/h2>\",\"content_en_us\":\"\n\n<h2><strong>Cyber Smart - IT security awareness training<\\\/strong><\\\/h2>\",\"title_element\":\"h3\",\"title_style\":\"h2\"}},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>IT-Security f\\u00e4ngt beim Menschen an! Mit Cyber Smart st\\u00e4rken wir euer Team gegen die Gefahren des digitalen Alltags. Unsere Awareness-Schulungen sind immer up-to-date und werden regelm\\u00e4\\u00dfig angepasst \\u2013 schlie\\u00dflich \\u00e4ndern sich die Angriffsstrategien gef\\u00fchlt t\\u00e4glich. Uns ist besonders wichtig, dass wir Menschen an praxisnahen Beispielen zeigen, wie Cyberkriminelle versuchen Ihre Opfer auszutricksen. Und das Beste: Durch Phishing-Simulationen k\\u00f6nnen eure Leute auch mal selbst ausprobieren, was im Ernstfall zu tun ist (keine Sorge, das tut nicht weh).<\\\/p>\",\"content_en_us\":\"\n\n<p>IT security starts with people! With Cyber Smart, we strengthen your team against the dangers of everyday digital life. Our awareness training courses are always up-to-date and are regularly updated - after all, attack strategies seem to change on a daily basis. It is particularly important to us that we use practical examples to show people how cyber criminals try to trick their victims. And best of all: phishing simulations allow your people to try out for themselves what to do in an emergency (don't worry, it won't hurt).<\\\/p>\",\"css\":\".el-element {\\n    margin-top: 60px;\\n\\tmax-width: 580px;\\n}\",\"margin\":\"default\"}},{\"type\":\"table\",\"props\":{\"animation\":\"none\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"table_order\":\"1\",\"table_responsive\":\"overflow\",\"table_width_meta\":\"shrink\",\"table_width_title\":\"shrink\"},\"children\":[{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>1x1 der IT-Security: Kompaktes Wissen in verst\\u00e4ndlichen Modulen<\\\/p>\",\"content_en_us\":\"\n\n<p>1x1 of IT security: compact knowledge in easy-to-understand modules<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\",\"title\":\"\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Video-on-Demand-Training \\u00fcber unsere eigene Lernplattform (Tec Networks Academy)<\\\/p>\",\"content_en_us\":\"\n\n<p>Video-on-demand training via our own learning platform (Tec Networks Academy)<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>Phishing-Simulation \\u2013 f\\u00fcr Praxiserfahrung im Umgang mit Verdachtsf\\u00e4llen<\\\/p>\",\"content_en_us\":\"\n\n<p>Phishing simulation - for practical experience in dealing with suspected cases<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}},{\"type\":\"table_item\",\"props\":{\"content\":\"\n\n<p>regelm\\u00e4\\u00dfige Management-Reports zum Lernfortschritt<\\\/p>\",\"content_en_us\":\"\n\n<p>Regular management reports on learning progress<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/blue-check.svg\",\"image_alt\":\"check\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}},{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"<strong>Die Themen im Training:<\\\/strong>\",\"content_en_us\":\"<strong>The topics in the training:<\\\/strong>\",\"title_element\":\"div\",\"title_style\":\"text-large\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":false,\"show_link\":false,\"show_meta\":false,\"show_title\":false,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Grundregeln f\\u00fcr sicheres Verhalten<br \\\/>Schutz vor SPAM &amp; Phishing<br \\\/>Sicherer Umgang mit Zugangsdaten<\\\/p>\",\"content_en_us\":\"\n\n<p>Basic rules for secure behavior<br \\\/>Protection against SPAM &amp; phishing<br \\\/>Secure handling of access data<\\\/p>\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sicheres mobiles Arbeiten<br \\\/>Schutz vor Social Engineering<br \\\/>Umgang mit neuen KI-Tools<\\\/p>\",\"content_en_us\":\"\n\n<p>Secure mobile working<br \\\/>Protection against social engineering<br \\\/>Dealing with new AI tools<\\\/p>\"}}]},{\"type\":\"button\",\"props\":{\"animation\":\"none\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"medium\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Jetzt Cyber Smart anfragen\",\"content_en_us\":\"Request Cyberguard now\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"kontakt\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"fragment\",\"props\":{\"class\":\"cyber-smart-wrapper\",\"css\":\"@media only screen and (max-width: 549.99px) {\\n    .cyber-smart-wrapper {\\n        max-width: 440px;   \\n        margin: auto;\\n        padding-top: 20px;\\n    }\\n    \\n    .cyber-smart-wrapper .uk-grid > div  {\\n        padding: 0;  \\n        margin-bottom: -20px;\\n    }\\n    \\n    .cyber-smart-wrapper .uk-grid {\\n        margin-left: 0 !important;\\n        position: relative; \\n    }\\n\\n    .cyber-smart-wrapper .uk-grid > div  {\\n        display: flex;\\n        width: 100%;\\n        flex-wrap: wrap;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-left {\\n        padding: 0;\\n        margin: 0;\\n        position: relative;\\n        top: 0;\\n        left: 0px;\\n        width: 177px;\\n        height: 177px;\\n    }\\n    \\n    .cyber-smart-wrapper .cyber-section-left > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        position: relative;\\n        top: 0;\\n        left: 183px;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-left img {\\n        object-fit: cover;\\n        height: 100%;\\n        -moz-transform: rotate(90deg);\\n        -o-transform: rotate(90deg);\\n        -webkit-transform: rotate(90deg);\\n        transform: rotate(90deg);\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right {\\n        position: relative;\\n        width: 100%;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid {\\n        display: flex;\\n        flex-wrap: nowrap;\\n        top: -82px;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        display: flex;\\n        flex-wrap: nowrap;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right .uk-first-column:nth-child(1) {\\n        margin-bottom: 18px;   \\n        left: 6px;\\n        position: relative;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid > div:nth-child(1) img {\\n        object-fit: cover;\\n        width: 177px !important;\\n        height: 177px;\\n        position: relative;\\n        right: -40px;\\n        top: -50px;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid > div:nth-child(2) img {\\n        object-fit: cover;\\n        width: 213px;\\n        height: 213px;\\n        display: flex;\\n        top: 70px;\\n        position: relative;\\n        left: -40px;\\n    }\\n}\\n\\n@media only screen and (min-width: 550px) {\\n    .cyber-smart-wrapper {\\n    \\tpadding-top: 90px;\\n        max-width: 630px;\\n    }\\n    \\n    .cyber-smart-wrapper .uk-grid {\\n        margin-left: 0 !important;\\n        position: relative; \\n    }\\n\\n    .cyber-smart-wrapper .uk-grid > div  {\\n        display: flex;\\n        width: 100%;\\n        flex-wrap: wrap;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-left > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        width: 304px;\\n        height: 304px;\\n        position: relative;\\n        top: 0;\\n        left: 200px;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-left img {\\n        object-fit: cover;\\n        height: 100%;\\n        -moz-transform: rotate(90deg);\\n        -o-transform: rotate(90deg);\\n        -webkit-transform: rotate(90deg);\\n        transform: rotate(90deg);\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right {\\n        position: relative;\\n        width: 100%;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid {\\n        display: flex;\\n        flex-wrap: nowrap;\\n        top: -82px;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid > div {\\n        padding: 0;\\n        margin: 0;\\n        display: flex;\\n        flex-wrap: nowrap;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right .uk-first-column:nth-child(1) {\\n        margin-bottom: 18px;   \\n        left: 6px;\\n        position: relative;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid > div:nth-child(1) img {\\n        object-fit: cover;\\n        width: 304px !important;\\n        height: 304px;\\n        position: relative;\\n        right: 0px;\\n        top: -100px;\\n    }\\n\\n    .cyber-smart-wrapper .cyber-section-right > .uk-grid > div:nth-child(2) img {\\n        object-fit: cover;\\n        width: 304px;\\n        height: 304px;\\n        display: flex;\\n        top: 100px;\\n        position: relative;\\n        left: -120px;\\n    }\\n}\\n\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"class\":\"cyber-section-left\",\"content_column_breakpoint\":\"m\",\"css\":\"@media only screen and (min-width: 960px) {\\n\\n    .uk-panel > .uk-panel {\\n        margin-top: 0 !important;\\n    }\\n}\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/11\\\/cyber-smart.png\",\"image_alt\":\"Cyber Smart Bild\"}}]},{\"type\":\"grid\",\"props\":{\"class\":\"cyber-section-right\",\"content_column_breakpoint\":\"m\",\"css\":\"@media only screen and (min-width: 960px) {\\n\\n    .uk-panel > .uk-panel {\\n        margin-top: 0 !important;\\n    }\\n}\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-smart-1.png\",\"image_alt\":\"cyber guard bild\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-smart-2.png\",\"image_alt\":\"cyber smart\"}}]}]}]}]}]}]}]}]}]}],\"name\":\"Angebote\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding_remove_horizontal\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"blend\":false,\"content\":\"Ein Team, ein Ziel\",\"content_en_us\":\"One team, one goal\",\"margin\":\"small\",\"margin_remove_bottom\":false,\"text_align\":\"left\",\"title_color\":\"secondary\",\"title_element\":\"div\",\"title_style\":\"h6\"}},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<h2><strong>Das IT-Security-Team von Tec Networks: Eure Lotsen durch die digitale See<\\\/strong><\\\/h2>\",\"content_en_us\":\"\n\n<h2><strong>The IT security team at Tec Networks: your pilots through the digital sea<\\\/strong><\\\/h2>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\"}},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Unser IT-Security-Team besteht aus Profis, die nicht nur die Technik, sondern auch die Herausforderungen der digitalen Welt in- und auswendig kennen. Genau das Team, das ihr braucht, um sicher durch die Untiefen der digitalen Welt zu man\\u00f6vrieren \\u2013 egal ob hohe Wellen oder ruhige Gew\\u00e4sser.<\\\/p>\",\"content_en_us\":\"\n\n<p>Our IT security team is made up of professionals who not only know the technology inside out, but also the challenges of the digital world. Exactly the team you need to maneuver safely through the shoals of the digital world - whether it's high waves or calm waters.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"4\",\"icon_width\":80,\"image_align\":\"top\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"div\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><strong>Daniel Juhnke<\\\/strong><br \\\/>Chief Executive Officer<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/02\\\/daniel-juhnke-tecnetworks.png\",\"image_alt\":\"Portr\\u00e4t von Daniel Juhnke\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><strong>Tino Weber<\\\/strong><br \\\/>Consultant &amp; Engineer<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/02\\\/tino-weber-tecnetworks.png\",\"image_alt\":\"Portr\\u00e4t von Tino Weber\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><strong>Matthias K\\u00f6sters<\\\/strong><br \\\/>Consultant &amp; Engineer<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/02\\\/matthias-koesters-tecnetworks.png\",\"image_alt\":\"Portr\\u00e4t von Matthias K\\u00f6sters\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><strong>Marco Bodewes<\\\/strong><br \\\/>Finance &amp; Controlling<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/02\\\/marco-bodewes-tecnetworks.png\",\"image_alt\":\"Portr\\u00e4t von Marco Bodewes\"}}]},{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<h3><strong>Ihr habt Fragen zu unseren IT-Security-Paketen? <br \\\/>Wir beraten euch gerne.<\\\/strong><\\\/h3>\",\"content_en_us\":\"\n\n<h3><strong>Do you have questions about our IT security packages? <br\\\/> We will be happy to advise you.<\\\/strong><\\\/h3>\",\"css\":\"p {\\n    font-size: 24px;\\n}\\n\\n@media only screen and (max-width: 600px) {\\n    p {\\n        font-size: 22px;\\n    }\\n}\",\"margin\":\"large\",\"margin_remove_bottom\":true,\"title_element\":\"div\"}},{\"type\":\"button\",\"props\":{\"animation\":\"none\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"medium\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Jetzt Kontakt aufnehmen\",\"content_en_us\":\"Contact us now\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"kontakt\\\/\"}}]}]}]}],\"name\":\"Ein Team, ein Ziel\"}],\"version\":\"4.5.28\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity IT-Security mit Tec Networks: Sicher, smart und immer up-to-date Egal, ob ihr eure IT einfach mal auf Schwachstellen durchleuchten lassen wollt oder euch eine dauerhafte \u00dcberwachung w\u00fcnscht. Wir \u00fcbernehmen f\u00fcr euch die entscheidenden Aufgaben im Bereich Cyber-Security als Managed Service, sodass ihr euch voll auf euer Business konzentrieren k\u00f6nnt. Und weil IT-Sicherheit beim Anwender [&hellip;]<\/p>\n","protected":false},"author":200920383,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-392","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/pages\/392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/users\/200920383"}],"replies":[{"embeddable":true,"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":100,"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/pages\/392\/revisions"}],"predecessor-version":[{"id":2092,"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/pages\/392\/revisions\/2092"}],"wp:attachment":[{"href":"https:\/\/tec-networks.xyz\/en\/wp-json\/wp\/v2\/media?parent=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}